Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Kennesaw State University (34)
- Walden University (8)
- Old Dominion University (4)
- University of Arkansas, Fayetteville (3)
- University of South Florida (3)
-
- Liberty University (2)
- California State University, San Bernardino (1)
- City University of New York (CUNY) (1)
- Embry-Riddle Aeronautical University (1)
- James Madison University (1)
- Nova Southeastern University (1)
- Purdue University (1)
- Southern Methodist University (1)
- St. Mary's University (1)
- The University of Akron (1)
- University of Kentucky (1)
- University of Tennessee, Knoxville (1)
- Publication
-
- Journal of Cybersecurity Education, Research and Practice (34)
- Walden Dissertations and Doctoral Studies (8)
- Doctoral Dissertations and Projects (2)
- Engineering Management & Systems Engineering Theses & Dissertations (2)
- Military Cyber Affairs (2)
-
- Accounting Undergraduate Honors Theses (1)
- CCE Theses and Dissertations (1)
- Capstones (1)
- Electronic Theses, Projects, and Dissertations (1)
- Engineering Technology Faculty Publications (1)
- Faculty Publications (1)
- Graduate Theses and Dissertations (1)
- International Journal of Nuclear Security (1)
- MPA/MPP/MPFM Capstone Projects (1)
- Publications (1)
- SMU Data Science Review (1)
- Senior Honors Projects, 2020-current (1)
- TFSC Publications and Presentations (1)
- The Scholar: St. Mary's Law Review on Race and Social Justice (1)
- USF Tampa Graduate Theses and Dissertations (1)
- VMASC Publications (1)
- Williams Honors College, Honors Research Projects (1)
- Publication Type
Articles 61 - 65 of 65
Full-Text Articles in Physical Sciences and Mathematics
The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson
The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson
International Journal of Nuclear Security
Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.
Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …
Strategic Cyber-Risk Implications Of Cloud Technology Adoption In The U.S. Financial Services Sector, Olatunji Mujib Arowolo
Strategic Cyber-Risk Implications Of Cloud Technology Adoption In The U.S. Financial Services Sector, Olatunji Mujib Arowolo
Walden Dissertations and Doctoral Studies
According to research, the risks of adopting new technology and the technological and organizational factors that influence adopting it are not clear. Thus, many financial institutions have hesitated to adopt cloud-computing. The purpose of this quantitative, cross-sectional study was to evaluate the cyber-risk implications of cloud-computing adoption in the U.S. financial services sector. The study examined 6 technological and organizational factors: organization size, relative advantage, compliance, security, compatibility, and complexity within the context of cyber-risk. Using a combination of diffusion of innovation theory and technology-organization-environment framework as the foundation, a predictive cybersecurity model was developed to determine the factors that …
Strategies To Minimize The Effects Of Information Security Threats On Business Performance, Stella Ifeyinwa Okoye
Strategies To Minimize The Effects Of Information Security Threats On Business Performance, Stella Ifeyinwa Okoye
Walden Dissertations and Doctoral Studies
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory multiple case study was to explore the strategies small and medium-sized enterprise (SME) leaders use to minimize the effects of information security threats on business performance. Semistructured interviews were conducted with 5 SME leaders who worked in SME firms that support oil and gas industry sector in Port Harcourt, Nigeria, had …
Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord
Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord
Journal of Cybersecurity Education, Research and Practice
Threats to information assets have always been a concern to those responsible for making information useful and defending its value. The concepts of threat, threat agent, threat events and threat sources have evolved in recent years have very precise definitions. A summary of threat classification models used in academic research is provided along with a summary of recent industry threat assessment reports. Finally, the results from a recent study, 2015 SEC/CISE Threats to Information Protection Report Including a Current Snapshot of the State of the Industry, are given.
Exploring The Cybersecurity Hiring Gap, Adam O. Pierce
Exploring The Cybersecurity Hiring Gap, Adam O. Pierce
Walden Dissertations and Doctoral Studies
Cybersecurity is one of the fastest growing segments of information technology. The Commonwealth of Virginia has 30,000 cyber-related jobs open because of the lack of skilled candidates. The study is necessary because some business managers lack strategies for hiring cybersecurity professionals for U.S. Department of Defense (DoD) contracts. The purpose of this case study was to explore strategies business managers in DoD contracting companies used to fill cybersecurity positions. The conceptual framework used for this study was the organizational learning theory. A purposeful sample of 8 successful business managers with cybersecurity responsibilities working for U.S. DoD contracting companies that successfully …